Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 00:35

General

  • Target

    942da42daa788773dffa7e079a4cf950_NeikiAnalytics.exe

  • Size

    90KB

  • MD5

    942da42daa788773dffa7e079a4cf950

  • SHA1

    f27aeaf2b8514c9406232757f4cc0d9595b83fdd

  • SHA256

    54a303cf834f2d2747d57597bda7e3f70dd39b64448dfc85ae3fe38316e07e9d

  • SHA512

    6784c84b13a619c8b5aafe1947309635b27869c89dc4d2a779725d58fe5067b275c96b36ed27f4bc3a678fc9bf89c3ede5be529b426f4bc652fec606c21b53d5

  • SSDEEP

    1536:W7ZhA7pApvOsOKjC0YSilpFpfkJOM2kJOMIsKsc696xZDKUXxXD:6e7WpXYvndvKUXxXD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3458) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\942da42daa788773dffa7e079a4cf950_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\942da42daa788773dffa7e079a4cf950_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    90KB

    MD5

    14c3eee35303c529e5d0e88608ef5361

    SHA1

    279bbae023c65e36af1daf25a4aecedb2beba086

    SHA256

    73241deabb7d8688653fef31b6951000ff06b0864af033a5704d72fed47f2690

    SHA512

    73c11a2e5e9f69746f61797fe8f6c3abc513842d50a21a389c69a39afcc6bdca3c215739c99bdeaea08fc1c2cd2bd47ef7e063caa6da51a69bfdfeb887f37603

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    99KB

    MD5

    4b4160c57330516040429f636b3f45c7

    SHA1

    bc4dba6690e6de1f531c526524f2a65eb81ed165

    SHA256

    59123bd8fb70451f6535a9b63d81422929041606cae83e8737d8ae95a314b180

    SHA512

    44e27b9df50933b544fef784cb6d80269e72afb4ae1b2c1f81984d27f697a00d0a6c3d759a2397f7211043c6e5d2d4411bb3187314d97fcb3e5e5592393172f4